Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02/03/2023, 01:15

General

  • Target

    f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d.docx

  • Size

    351KB

  • MD5

    4d93662383a5a4ede5adaa924360b7fc

  • SHA1

    2156d10195ad7402fba5821886abb12b2f326203

  • SHA256

    f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d

  • SHA512

    335c39b43fa306aac5642ffe69992766fcea0f689a5cb42eff8226efce4f6a45d7e525f673348a23d66aa7bffc84f08237859b6085023dfaf285b5bb868f6822

  • SSDEEP

    6144:V8Cyjf3ktT/T0+RN718HFRdHnwlUhsm6uxPTUqhHB4NhpwqQ3P:OJj8A+RB18HFg6hp6u9TD2vQf

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\f94cfe3d53b9bfe642318f051d195ab1e443a97301d17e143eb3e19e2744959d.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1744

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    e71c8443ae0bc2e282c73faead0a6dd3

    SHA1

    0c110c1b01e68edfacaeae64781a37b1995fa94b

    SHA256

    95b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72

    SHA512

    b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

    Filesize

    128KB

    MD5

    30a1738564c226eb0c8f083a913c5741

    SHA1

    5a4586abf065c4516e8248ba373b7b4e4d87c83f

    SHA256

    15eccd61212cc4f5c84ee68e0d4a03c57566256a382cf6196a876c9383c944f4

    SHA512

    9f3c5a6b505ba3bbbc2757c9359fef044244bf97ae16e59dcf77e72c1b7e55de07a7ed69b4e3f5718b55324b329eb24c2e8910554a39fa50d2ff0bd374d9d071

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{45054769-847E-4D4C-AF63-2D0485FBE8B6}.FSD

    Filesize

    128KB

    MD5

    34430317187cbe8a89aaaff30ee97593

    SHA1

    e3dea5b82b88b69abdb28a935b01fd9187de1039

    SHA256

    4c96b6ed56ae36368363ef8176c0221ae0b6314135296a6c8807a10946a9f36e

    SHA512

    3ca6341a1e2bd2e9a2dbc5180a2db3aaeca39d20033e5743e812f4962051c9d5ef43b5869ec79938b4719feba2ab38ab7073fad4426152aa30538036a0379b9f

  • C:\Users\Admin\AppData\Local\Temp\Cab36BE.tmp

    Filesize

    61KB

    MD5

    fc4666cbca561e864e7fdf883a9e6661

    SHA1

    2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

    SHA256

    10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

    SHA512

    c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

  • C:\Users\Admin\AppData\Local\Temp\Tar38E7.tmp

    Filesize

    161KB

    MD5

    be2bec6e8c5653136d3e72fe53c98aa3

    SHA1

    a8182d6db17c14671c3d5766c72e58d87c0810de

    SHA256

    1919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd

    SHA512

    0d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff

  • C:\Users\Admin\AppData\Local\Temp\{B40ADE66-3BEE-4623-85C7-348465769DC5}

    Filesize

    128KB

    MD5

    d28c34e6d036d269f7020edc54e15c33

    SHA1

    e8ba9f4e02bdcb46c3bd5a8a2bdf679fc66c36c7

    SHA256

    97ac21c30c44d40ec0162cdc854d77c2baf5b32e5615d20626f70692bfce10fe

    SHA512

    1a8a7b44ab89719480cc49a4b9e79865a7d6ce13e4d78c71ce8cb79a399e153cefb3df7b9f53a4da984fa0ef0a74e02332efa9e47cfbfc5eeeb4ce50a1755a34

  • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

    Filesize

    20KB

    MD5

    1dcbd1dafec7df43a082845b2bd45321

    SHA1

    483b5cd374adc27fb2cd68d7e8bddea6b980e84b

    SHA256

    4b75597b2b0ad8a2073b7c04cec32af69bf88f7ae547b5c1e906a39f0ddd72d5

    SHA512

    fa62d8c46b9464c7973a9f179cdb3af1190f57e6869df99807d265b2735a3453ba65404c974b03adfad9856b69bcbee9539ea4534b08bbfcddaea2d8a34e3c42

  • memory/1744-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1744-772-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB